Process mining and security: detecting anomalous process executions and checking process conformance
From MaRDI portal
Publication:2849568
zbMATH Open1272.68348MaRDI QIDQ2849568FDOQ2849568
Authors: W. M. P. van der Aalst, A. K. A de Medeiros
Publication date: 20 September 2013
Full work available at URL: http://www.sciencedirect.com/science/article/pii/S1571066105000228
Recommendations
- Process mining: realization and optimization of process discovery algorithm
- Classification trees as a technique for creating anomaly-based intrusion detection systems
- AI 2005: Advances in Artificial Intelligence
- Discovering unseen behaviour from event logs
- Application of data mining in computer security.
Cited In (1)
This page was built for publication: Process mining and security: detecting anomalous process executions and checking process conformance
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849568)